Sciweavers

223 search results - page 41 / 45
» Recommendation as Classification: Using Social and Content-B...
Sort
View
CCR
2010
133views more  CCR 2010»
13 years 7 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
IJDMMM
2008
124views more  IJDMMM 2008»
13 years 7 months ago
Completing missing views for multiple sources of web media
: Combining multiple data sources, each with its own features, to achieve optimal inference has received a lot of attention in recent years. In inference from multiple data sources...
Shankara B. Subramanya, Zheshen Wang, Baoxin Li, H...
CHI
2007
ACM
13 years 11 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
CHI
2010
ACM
14 years 9 days ago
What's your idea?: a case study of a grassroots innovation pipeline within a large software company
Establishing a grassroots innovation pipeline has come to the fore as strategy for nurturing innovation within large organizations. A key element of such pipelines is the use of a...
Brian P. Bailey, Eric Horvitz
AIL
2004
107views more  AIL 2004»
13 years 7 months ago
AI and the Conquest of Complexity in Law
The paper identi es some of the problems with legal systems and outlines the potential of AI technology for overcoming them. For expository purposes, this outline is based on a si...
L. Bibel